Tag Archives: Cyber Security

CYBER.ORG – 1.1.11 – Watering Hole Attacks & Case Study – Watering Hole

Objective:

Compare and contrast types of attacks.

Resources:

  • See PowerPoint presentation: 1.1.11 – Watering Hole Attacks.pptx and PDF Document Case Study – Watering Hole.pdf

Assignment:

  1. Begin reading the 1.1.11 Watering Hole Attacks.pptx presentation.
  2. Read the Case Study – Watering Hole.pdf document and be prepared to answer the questions at the end.
  3. Answer the Case Study questions in the Google Form provided in today’s Assignment Post in our Google Classroom.
  4. Please do your best to complete this Case Study by the end of the class period today.

Assigned: February 14th, 2023
Teacher Pacing Due Date: February 15th, 2023

CyberSecurity Resources: Hacksplaining

Objective: 

Students will begin preparing for CyberSecurity careers by familiarizing themselves with known vulnerabilities faced by software developers.

Links:

Topics Discussed:

  • Cyber Security
  • NIST
  • National Vulnerability Database
  • CVE (Common Vulnerabilities and Exposures) Database

Assignment:

  1. Visit the Hacksplaining website and create a login using your haydenmagnet.org email account.
  2. Hacksplaining offers hands-on interactive simulations of hacks that exploit known vulnerabilities in many widely used applications and programming languages.
  3. Each module contains three parts: Exercise, Prevention and Quiz. Complete the exercise to see how the hack is performed. Review the prevention information to learn more about the exploited vulnerability and effective methods of protection. Complete the quiz to confirm your understanding and complete the module.
  4. Take a screenshot of your passing quiz grade for each module to provide verification that you have completed the module. Save all these screenshots in a folder, as you will need to submit them in a Google Doc to receive credit for this project.
  5. There are twenty-five modules in total. You have this week and next week to complete all the modules.
  6. Submit a Google Doc containing screenshots of your passing grades for all 25 module quizzes to today’s Google Classroom assignment post by end of day on Friday, February 10th.

Assigned: January 31st, 2023
Teacher Pacing Due Date: February 10th, 2023

CyberStart America Resources: Cryptography Links – Spring 2023

Objective: 

Students will continue preparing for competition in the National Cyber League by familiarizing themselves with common cryptographic methods so that they can effectively identify and decrypt encrypted messages and data.

Topics Discussed:

  • Cryptography
  • Ciphertext
  • Plaintext

Links:

This list is maintained as a resource for students competing in the National Cyber League competition to assist in identification and solution of the presented Cryptography puzzles. If you find any good online Cryptography resources in your travels, let me know and I will add them to the list!

Cryptii  A very cool and very fast “modular” decryption tool that lets you run a string of text through several encryption/decryption methods of your choice.

Dcode.fr  An outstanding French website that offers automatic decoding for a large variety of encryptions. Features include a powerful cipher identifier (that automatically recognizes more than 200 ciphers), decoding tools for the Caesar cipherVigenere cipherPolybius’ square, and dozens of other encryptions.

The Black Chamber  A great collection of interactive tools that explain and allow you to decrypt a variety of common (and some uncommon) encoding schemes.

Tools for Noobs: Online Decryption Tool – Decrypts a string using various algorithms (e.g. Blowfish, DES, TripleDES, Enigma).

MD5hashing.net Encryption and Decryption – At md5hashing.net you can hash (encrypt) any string into 66 different hash types. As you probably know – decryption of any hash is impossible, but they offer reverse decryption via our database (~1000M records, and counting).

Splitbrain.org Encoding/Decoding Tools This tool helps you to quickly run some text through various different encoding/decoding functions available in PHP. Great for a lot of different decoding possibilities rapidly

CodeBeautify.org Encryption/Decryption Tool – A nice, clean tool for decrypting codes that you know the key for, or encrypting codes with your own original key.

SQLite Viewer for Chrome – Chrome plugin for viewing SQLite databases in your browser. Allows opening and editing of SQLite databases without requiring admin access to install.

Posted: January 13th, 2023

Welcome to CyberStart America!

Objective: 

Students will begin preparing for competition in the National Cyber League by participating in CyberStart America, an immersive cybersecurity training game for high school students.

Links:

Topics Discussed:

  • Cyber Security
  • CyberStart America

Assignment:

  1. Welcome back! I hope your holidays were happy and restful! We are going to switch gears as we work towards competition in the National Cyber League and/or Security + Certification at the end of the month.
  2. In the interest of providing you with more hands-on experience with cybersecurity concepts, I am pleased to introduce CyberStart America, an immersive cybersecurity training game for high school students, where you will take the role of an agent with the “Cyber Protection Agency” and solve challenging puzzles based on real-world situations that you might face as a cybersecurity professional.
  3. Visit the CyberStart America website and register for a free account using your haydenmagnet.org email address. You will need to access your haydenmagnet.org Gmail, as the website sends several confirmation emails in sequence. Be sure to keep your Gmail open until you receive the third confirmation email that allows you to set a password before you proceed with the challenges.
  4. Start with the Intern Base to get a feel for what it’s like to work in cybersecurity. You may work at your own pace, and even work from home if you choose to do so. Remember that these challenges start easy and get harder as you progress, so don’t skip forward too far!
  5. Are you completely confused by any particular challenge? Consult the Field Manual! Click the “Field Manual” link in the upper left corner of the website to view background info on the concepts presented in the challenges, and even watch walkthrough videos (Chapter 07) if you’re completely stumped.
  6. You may work at your own pace, and use any resources that you have available to you to complete the challenges (even other students!)
  7. Do you want to work together with a partner or squad up with a group? Click on the “Groups” link at the top of the page, and click “Create Group” to get a group code that you can share with your crew to squad up and tackle the challenges as a team of up to 3 people!
  8. Make sure you join my “NetOp P6” group so I can track your progress, as well. See me for the Join code if you haven’t joined already.
  9. We will continue working with CyberStart America for the next three weeks. At the end of the three weeks, I will buy lunch for the individual or team with the highest point total. Grind solo and get all the food for yourself, or choose your teammates wisely and have a victory feast with your friends!
  10. Good luck, and have fun with the challenges! Bear in mind that the National Cyber League competition will begin at the end of the month. Those who are not studying for Security + certification will begin practicing in the NCL Gym when our accounts become available.

Assigned: January 9th, 2023
Teacher Pacing Due Date: January 27th, 2023

NETWORKING AND CYBERSECURITY 1H MIDTERM EXAM – FALL 2022

Objective: Demonstrate proficiency in Cybersecurity Principles through completion of a final comprehensive assessment.

Resources:

  • All CYBER.ORG Lesson slideshows, Case Studies and Labs presented in class
  • https://apps.cyber.org Kali Linux virtual environment

Assignment:

  • Complete the CYBER.ORG – Networking and Cybersecurity 1H Midterm Exam Fall 2022 assessment provided in today’s Google Classroom assignment post by the end of the class period today.
  • This is an “open resource” exam, meaning you will be able to use any materials accessible on your computer. This includes any websites, past assignments, completed projects, installed applications, or notes you may have taken.
  • You may not, however, collaborate with your classmates; Please remain silent until everyone has completed the quiz.
  • The exam contains fifty multiple-choice questions. Please carefully read all instructions and select the best answer from the available choices for each question.
  • You have seventy-five minutes to complete the test. Be sure to submit your test answers before the end of the class period.
  • While it is advised to check your answers before submitting your exam, please bear in mind that the testing session will end at 12:10pm, so you must use your time wisely.

Assigned: December 21st, 2022
Teacher Pacing Due Date: December 21st, 2022

NETWORKING AND CYBERSECURITY 1: SEMESTER 1 FINAL EXAM FALL 2022 REVIEW

Objective:

  • I can demonstrate my understanding of CyberSecurity Principles through a summative exam.

Links:

Google Classroom: https://classroom.google.com/

Topics Discussed:

  • Linux
  • CyberSecurity Law
  • Security Basics
  • Actors and Vulnerabilities

Assignment:

  1. Click the Google Classroom link and log in with your Haydenmagnet.org email address.
  2. You will find a Class Announcement titled “NETWORKING AND CYBERSECURITY 1: SEMESTER 1 FINAL EXAM FALL 2022 REVIEW“. Attached, you will find a copy of the Final Exam that you may use to review for tomorrow’s test.
  3. This is an “open resource” exam, meaning you will be able to use any materials accessible on your computer. This includes any websites, past assignments, completed projects, installed applications, or notes you may have taken.
  4. You may not, however, collaborate with your classmates; Please remain silent until everyone has completed the quiz.
  5. The exam contains fifty multiple-choice questions. Please carefully read all instructions and select the best answer from the available choices for each question.
  6. You have seventy-five minutes to complete the test. Be sure to submit your test answers before the end of the class period.

Posted: December 19th, 2022

CYBER.ORG – 1.2.5 – Hoaxes

Objective:

Compare and contrast types of attacks.

Resources:

  • See PowerPoint presentation: 1.2.5 Hoaxes
  • See PDF Document: Case Study – Hoaxes

Assignment:

  1. Begin reading the 1.2.5 Hoaxes.pptx presentation.
  2. Read the Case Study – Hoaxes.pdf document and be prepared to answer the questions at the end.
  3. Answer the Case Study questions in the Google Form provided in today’s Assignment Post in our Google Classroom.
  4. Please do your best to complete this Case Study by the end of the class period today.

Assigned: December 14th, 2022
Teacher Pacing Due Date: December 14th, 2022

CYBER.ORG – 1.1.6 – Prepending, 1.1.7 – Identity Fraud & 1.1.9 – Reconnaissance

Objective: Compare and contrast types of attacks.

Resources:

  • See PowerPoint presentations: 1.1.6 – Prepending, 1.1.7 – Identity Fraud & 1.1.9 – Reconnaissance.

Assignment:

  1. Begin reading the 1.1.6 – Prepending.pptx, 1.1.7 – Identity Fraud and 1.1.9 – Reconnaissance presentations.

Assigned: January 13th, 2022

CYBER.ORG – 1.1.3 – Dumpster Diving & 1.1.4 – Shoulder Surfing, & Case Study – Dumpster Diving

Objective:

Compare and contrast different types of social
engineering techniques.

Resources:

See Powerpoint Presentations: 1.1.3 – Dumpster Diving.pptx, 1.1.4 – Shoulder Surfing.pptx and Case Study – Dumpster Diving.pdf

Assignment:

  1. Read the 1.1.3 – Dumpster Diving.pptx presentation. This lesson will introduce you to a form of information harvesting that involves digging through literal trash.
  2. Read the 1.1.4 – Shoulder Surfing.pptx presentation. This lesson will introduce you to a form of information harvesting that should make you a little more aware of who’s behind you while you’re entering sensitive information into a form or field.
  3. Begin reading the Case Study – Dumpster Diving.pdf document and be prepared to answer the questions at the end.
  4. Answer the Case Study questions in the Google Form provided in today’s Assignment Post in our Google Classroom.
  5. Please do your best to complete this Case Study by the end of the day on Tuesday, December 13th.

Assigned: December 12th, 2022
Teacher Pacing Due Date: December 13th, 2022